2017 IEEE Symposium on Computers and Communications (ISCC) 2017
DOI: 10.1109/iscc.2017.8024505
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and dynamic pseudonyms change system for privacy in VANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…A dynamic change of pseudonyms-based security protocol was proposed to ensure privacy for the driver to handle all possible cases of changes in vehicle behavior during traffic [56]. A Vehicular Location Privacy Zone (VLPZ) based pseudonym changing and management scheme was proposed by [57].…”
Section: Requirementsmentioning
confidence: 99%
“…A dynamic change of pseudonyms-based security protocol was proposed to ensure privacy for the driver to handle all possible cases of changes in vehicle behavior during traffic [56]. A Vehicular Location Privacy Zone (VLPZ) based pseudonym changing and management scheme was proposed by [57].…”
Section: Requirementsmentioning
confidence: 99%
“…The pseudonym coefficient of node x is calculated using the pseudonym changing p x to divide by its VPL …”
Section: Proposed Workmentioning
confidence: 99%
“…When did vehicle node road network transmits information by way of node x, I pc, x is equal to 1,…., m. The pseudonym coefficient of node x is calculated using the pseudonym changing p x to divide by its VPL. 54 Algorithm 1: N = total number of pseudonyms changing 2: P x = pseudonyms changing node x 3: PC = pseudonyms transfer changing traffic information to distance to CH 4: Px = I pc, x 5: distance(PC) = pseudonym changing energy of node x 6: CH(P x ) = cluster head node 7: if (mod(I pc, x ,m)==1) then 8: for each integer m in n do 9: changing pseudonyms(P x ) = (VPL x (i), existing nodes(j)) 10: send (changing ID(i), existing nodes (j)) 11: CH(P x ) = best(changing ID) 12 The expected pseudonym changing energy consumption for cluster member I showed in Figure 5 while transmitting on channel j is estimating use as follows 55,56 :…”
Section: Clustering Protocolsmentioning
confidence: 99%
“…To prevent attackers from stealing vehicle privacy, the update of pseudonym is one of the effective methods to solve the problem that attackers keep tracking vehicles in VANETs. However, the privacy will not be protected if vehicles change pseudonym at inappropriate time or place, because that attackers can easily associate the new pseudonym with the previously used pseudonyms [6][7]. Beresford [8] first proposed the concept of Mix-zone in 2003, referring to the area of changing pseudonym.…”
Section: Related Workmentioning
confidence: 99%